Consulting

You are here

Put Cutter’s Experts to Work on Your Challenges

Cutter has no off-the-shelf consulting solutions — we view each assignment as unique, assembling a team custom-fit for your requirements, culture, budget, and business drivers. From business technology strategy development to enterprise architecture assessments, digital business transformation, to developing a customized software development framework, Cutter's experts deliver powerful solutions. See sample Cutter Consulting offerings by selecting one or any of the practice areas below.

Select specific practice areas by using the drop down list.

Security Risk Assessment and Review

Cutter Consortium is available for risk assessments, network assessments, application reviews, security-oriented design reviews, site and facility surveys, and configuration or source code reviews.


Outsourcing Implementation Support

The Consortium is prepared to help you throughout the lifetime of your sourcing agreement.


Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

Rebecca Herold will create Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guideline for your organization.


Project Office Development

Our Senior Consultants will work with you to design, build, and implement an independent Project Office that will enable you to consistently collect data, analyze it, and present the results.


Security Implementation and Operations

We can help you install and configure applications, deploy security systems as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration. If desired, we can even serve as acting-Chief Security Officer (CSO) while you conduct a search.


Sourcing Assessments

Cutter's team will then help you identify the appropriate sourcing options and help you derive a short list of potential vendors, including their strengths and weaknesses.


Information Security and Privacy Training and Awareness

Rebecca Herold

Create an information security and privacy program for your organization that is not only designed solely upon your its specific concerns, but takes into account the learners needs of those in your organization: their expectations, learning styles, time commitments, job responsibilities, learning levels and objectives.


Vendor Selection

Cutter's team can help you write RFPs that will elicit proposals that meet your requirements. We'll help evaluate the proposals that result from the RFP and make recommendations based on those proposals and our experience with similar sourcing and/or large software/hardware deals


Third-Party Security and Privacy Program Reviews

It is critical to know that the organizations to whom your organization has entrusted its data handling and processing functions have sound and effective information security and privacy programs.


Risk Management Oversight

Tim Lister

Get assistance and ongoing support risk management oversight and guidance for your enterprise.


Risk Management Assessment

Tim Lister

By framing the questions explicitly in terms of a worst case; switching perspectives and allowing people to describe the best case; examining blame-free, blameworthy, and partial failures, and employing additional techniques, Tim Lister is able to overcome the hesitation that prevents most people in most companies from articulating many risks they are aware of.


Litigation Support for Software Intensive Projects

Tim Lister

Let Cutter help you with vetting potential partners, understanding and quantifying schedules, requirements, specs, and risk management before signing contracts, to successfully prosecuting or defending against an IT-related lawsuit.


Pages